Information Exposure | |
Command Injection | |
SQL Injection | |
Incorrect Authorization | |
SQL Injection | |
XML Injection | |
Incorrect Authorization | |
Incorrect Authorization | |
Improper Input Validation | |
Command Injection | |
Improper Neutralization of Special Elements Used in a Template Engine | |
Access Control Bypass | |
Incorrect Authorization | |
Incorrect Authorization | |
Incorrect Authorization | |
Denial of Service (DoS) | |
Denial of Service (DoS) | |
Cross-site Scripting (XSS) | |
Server-side Request Forgery (SSRF) | |
XML Injection | |
XML Injection | |
Improper Input Validation | |
SQL Injection | |
Server-side Request Forgery (SSRF) | |
Improper Input Validation | |
Server-side Request Forgery (SSRF) | |
Cross-site Scripting (XSS) | |
Cross-site Request Forgery (CSRF) | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Access Control Bypass | |
Missing Support for Integrity Check | |
Improper Authorization | |
Improper Check for Unusual or Exceptional Conditions | |
Incorrect Authorization | |
Cross-site Scripting (XSS) | |
Access Control Bypass | |
Access Control Bypass | |
Access Control Bypass | |
Access Control Bypass | |
Information Exposure | |
Access Control Bypass | |
Access Control Bypass | |
Improper Authorization | |
Directory Traversal | |
Cross-site Scripting (XSS) | |
Time-of-check Time-of-use (TOCTOU) Race Condition | |
Time-of-check Time-of-use (TOCTOU) Race Condition | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Cross-site Scripting (XSS) | |
Improper Authorization | |